|
Message-ID: <21218.18131.870738.776866@gargle.gargle.HOWL> Date: Fri, 24 Jan 2014 11:56:19 +0100 From: rf@...eap.de To: oss-security@...ts.openwall.com Subject: Re: linux-distros membership >>>>> "RF" == rf <rf@...eap.de> writes: >>>>> "MM" == Moritz Muehlenhoff <jmm@...ian.org> writes: MM> We maintain the http://anonscm.debian.org/viewvc/kernel-sec/ MM> repository which tracks all kernel vulnerabilities as soon as MM> they're public. That's a good base for every Debian-derived MM> distro with a modified kernel. RF> Sounds interesting. How am I supposed to extract information RF> from this page? Are there some docs about how to use it? OK, think I got the basic idea. However, judging from a few CVE examples on the site, it seems there is no time advantage in using this site as compared to posts on this list. In fact the entries appear a couple of days later in some cases. So I'm afraid this won't be of too much help concerning the timing issue. Roland
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.